Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?

A.

The content in No. 2 must be configured.

B.

In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid

C.

The content in No. 4 must be configured.

D.

After the configuration is completed, you need to submit the configuration to take effect.

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

A.

PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.

B.

PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.

C.

PADIUS Used for Portal Server pushes to users Web page.

D.

PADIUS Used for server to SACG Security policy issued by the device

Which of the following options is about SACG The description of the online process is wrong?

A.

Terminal and Agile Controller-Campus Server communication SSL encryption

B.

Authentication fails, end users can only access resources in the pre-authentication domain

C.

Security check passed,Agile Controller-Campus Server notification SACG Will end user's IP Address switch to isolated domain

D.

Agile Controller-Campus Server gives SACG Carrying domain parameters in the message

Regarding the mail content filtering configuration of Huawei USG6000 products, which of the following statements is wrong?.

A.

Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.

B.

When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o

C.

When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.

D.

The attachment size limit is for a single attachment, not for the total size of all attachments.

File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

A.

True

B.

False

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

A.

True

B.

False

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

A.

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

For special message attacks, which of the following option descriptions is correct?

A Special control packet attack is a potential attack and does not have direct destructive behavior

B. The attacker probes the network structure by sending special control messages to launch a real attack.

C. Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.

D. Special control message items can only use ICMP to construct attack messages.

Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.

A.

TRUE

B.

FALSE

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

A.

Resource pool mechanism

B.

weighting mechanism

C.

load balancing

D.

Hot Standby